Login / Signup
Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation.
Nianhang Hu
Mengmei Ye
Sheng Wei
Published in:
IEEE Trans. Emerg. Top. Comput. (2019)
Keyphrases
</>
information leakage
low cost
personal information
data sets
feature space
data collection
spatial domain
error correction